Please use this identifier to cite or link to this item: https://dspace.nlu.edu.ua//jspui/handle/123456789/19637
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYemanov, V.en
dc.contributor.authorPasichnyk, V.en
dc.contributor.authorYevtushenko, I.en
dc.contributor.authorLarin, S.en
dc.contributor.authorMykhailenko, O.en
dc.date.accessioned2023-05-12T07:19:43Z-
dc.date.available2023-05-12T07:19:43Z-
dc.date.issued2023-
dc.identifier.citationRanking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment / V. Yemanov, V. Pasichnyk, I. Yevtushenko, S. Larin, O. Mykhailenko // Ingenierie des Systemes d'Information. – 2023. – Vol. 28, is. 1. – P. 77–84. DOI: https://doi.org/10.18280/isi.280108en
dc.identifier.urihttps://dspace.nlu.edu.ua//jspui/handle/123456789/19637-
dc.description.abstractThe main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.en
dc.language.isoenen
dc.publisherНЮУ ім. Ярослава Мудрогоuk_UA
dc.subjectcybersecurityen
dc.subjectinformationen
dc.subjectrankingen
dc.subjectsecurityen
dc.subjectthreatsen
dc.subjectзахист інформаціїuk_UA
dc.subjectкібербезпекаuk_UA
dc.subjectранжуванняuk_UA
dc.subjectсоціально-економічна системаuk_UA
dc.titleRanking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environmenten
dc.typeBook chapteren
Appears in Collections:Наукові статті Інститута управління і права

Files in This Item:
File Description SizeFormat 
Yemanov_77-84.pdf1.27 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.